Authentication, Authorization, and Accountability

Authentication, Authorization, and Accountability
Security: AAA

Универсальный русско-английский словарь. . 2011.

Игры ⚽ Поможем решить контрольную работу

Смотреть что такое "Authentication, Authorization, and Accountability" в других словарях:

  • Health Insurance Portability and Accountability Act — The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996. According to the Centers for Medicare and Medicaid Services (CMS) website, Title I of HIPAA protects health insurance coverage for workers… …   Wikipedia

  • Collaboration-oriented architecture — is a concept used to describe the design of a computer system that is designed to collaborate, or use services, from systems that are outside of your locus of control. Collaboration Oriented Architecture will often utilize Service Oriented… …   Wikipedia

  • Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the …   Wikipedia

  • Collaboration Oriented Architecture — This is a term used in the areas of information security, IT security, network security and computer security.Collaboration Oriented Architecture is a concept used to describe the design of a computer system that is designed to collaborate, or… …   Wikipedia

  • Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Web Access Management — is a subcategory of the broader Identity management space. Web Access Management controls access to Web resources, providing: * Authentication Management * Policy based Authorization * Audit Reporting Services (optional) * Single sign on… …   Wikipedia

  • Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Policy appliances — are technical control and logging mechanisms to enforce or reconcile policy rules (information use rules) and to ensure accountability in information systems. [The use of policy appliances in this context was first described in K. A. Taipale,… …   Wikipedia

  • National Industrial Security Program — The National Industrial Security Program, or NISP, is the nominal authority (in the United States) for managing the needs of private industry to access classified information. The NISP was established in 1993 by Executive Order 12829.[1] The… …   Wikipedia

  • Medical device — A medical device is a product which is used for medical purposes in patients, in diagnosis, therapy or surgery[citation needed]. Whereas medicinal products (also called pharmaceuticals) achieve their principal action by pharmacological, metabolic …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»